Hi [[ session.user.profile.firstName ]]

Data Theft in the 21st Century: Detect and Block PII & PEI Theft

Cybersecurity expert Jay Beale will provide a State of the Industry look into theft and exposure of huge data sets of PII (personally identifiable information) and PEI (personally embarrassing and exposing information).

Join this presentation and learn about the recent thefts and the methods of detecting and blocking them.
Recorded Sep 8 2016 49 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jay Beale, COO at InGuardians
Presentation preview: Data Theft in the 21st Century: Detect and Block PII & PEI Theft

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Endpoint Security: The Right Balance Between Positive and Negative Approaches Recorded: Apr 26 2018 58 mins
    Forrester Senior Analyst Chris Sherman and Nyotron's Senior Director of Product Management Rene Kolga
    Endpoint security represents the frontline in your fight against cybercriminals. Despite the relative maturity of the endpoint security market, new threats and evolving attacker capabilities have proven traditional approaches inadequate - and left organizations exposed.

    Guest speaker Forrester Senior Analyst Chris Sherman and Nyotron's Senior Director of Product Management Rene Kolga will discuss the current state of endpoint security while highlighting a path forward for organizations looking to re-focus their strategies to combat current threats.

    Attendees will learn:

    • Which threats are causing the most difficulties for traditional
    endpoint security approaches
    • Why organizations need to balance positive and negative security
    •How to layer multiple tools for maximum protection
  • Why CISO's Get Fired Recorded: Apr 5 2018 23 mins
    Douglas Bayne, Rosario Mastrogiacomo and Bill Noonan
    This live webinar covers the most important things you need to know about the data, systems and assets that are living in your organization’s environment. Three of our industry experts: Douglas Bayne, Bill Noonan and Rosario Mastrogiacomo will be discussing the importance of knowing what’s in your environment and how to protect your most sensitive information. Specifically, they will be discussing:

    • How to gain visibility into your environment
    • Data security
    • The problems people have with unstructured data
    • Mishandling of data
    • Open access and much more!

    About the presenters:

    Douglas Bayne:

    Doug Bayne is the Director of Professional Services at SPHERE Technology Solutions. Doug is an industry expert with over 25 years of experience solving challenging business problems with re-engineering and technology across the Data Governance, E-Communications & Surveillance, and Identity & Access Management domains. Doug is a thought-leader and innovator with a deep understanding of technology, security and compliance. Doug brings his years of expertise to SPHERE by managing our services organization that delivers on the solutions that our clients depend on to solve their risk and mitigation needs.

    Rosario Mastrogiacomo:

    Rosario Mastrogiacomo is the Director of Architecture and Design at SPHERE Technology Solutions. Rosario is an experienced technology executive and industry leader with over 25 years of experience working in the financial services industry. At SPHERE, Mastrogiacomo is responsible for the strategy of SPHERE’s suite of solutions including SPHEREengine, and SPHEREboard.

    Bill Noonan:

    Bill Noonan is a Senior Director at SPHERE Technology Solutions and oversees Sales, Marketing and Business Development. As an experienced Executive and industry leader who is well-known throughout the business world, Noonan brings over 30 years of experience and expertise in a variety of disciplines, and has a huge list of accomplishments – and stories!
  • Cyber Threat Predictions & Security for 2018 Recorded: Dec 14 2017 61 mins
    Diana Kelley | Mark Weatherford | Jon Green | David McGuire | Ashton Mozano
    With major breaches exposing the personal information of hundreds of millions of Americans and disruptive ransomware attacks shaking the world in 2017, we'll examine the lessons learned from these events as a guide to shape CISO strategy for 2018.

    This interactive Q&A panel with security industry experts will explore:
    - The biggest threats on the horizon
    - Key vulnerabilities and how to protect against them
    - Measures for breach prevention, detection and response
    - Which areas to focus on in 2018
    - Recommendations for CISOs

    - Diana Kelley, Cybersecurity Field CTO, Microsoft
    - David McGuire, CEO, SpecterOps
    - Ashton Mozano, CTO, Circadence
    - Mark Weatherford, Chief Cybersecurity Strategist, vArmour
    - Jon Green, VP and Chief Technologist for Security at Aruba, a Hewlett Packard Enterprise Company
  • What Is the Value of Your Security Program? Recorded: Jun 20 2017 50 mins
    Joe Moles, Director of Detection Operations
    Many security teams find it challenging to prove their value and effectiveness, especially in the absence of compromise or breach activity. Learn how top-performing security teams take advantage of their visibility across the environment to provide ongoing, deeply insightful measurements and reporting that support broader business decisions. Applying these techniques can exponentially increase the overall value of your security team to the entire organization.

    In this webinar, you will learn:
    - A framework with actionable ways to report the effectiveness of your security program and tools
    - How to translate technical data into business objectives
    - Methods for identifying performance issues and opportunities across your team, processes, and tools
    - A simple calculation to systematically prioritize your alerts
    - Guidelines for driving strategic decisions based on the measurement of security tools

    About the Presenter: Joe Moles, Director of Detection Operations

    An IR and digital forensics specialist, Joe Moles has more than a decade of experience running security operations and e-discovery. As Director of Detection Operations at Red Canary, he leads a team of security analysts to help organizations defend their endpoints against threats. Prior to joining Red Canary, Joe built and led security operations, incident response, and e-discovery programs for Fortune 500 companies like OfficeMax and Motorola. He is regarded as an industry thought leader and regularly contributes to the Red Canary blog.
  • How to Recover from the WanaCrypt Ransomware Attack Recorded: May 18 2017 60 mins
    Phil Richards (CISO), Chris Goettl, and Amber Boehm of Ivanti Software
    On Friday the news broke: a massive ransomware attack which started in the UK NHS immediately spread to global proportions. By Sunday, the attack had impacted over 200,000 organizations in 150 countries. Listen to Phil Richards, CSO of Ivanti and a panel of security experts discuss how to recover from the WanaCrypt Ransomware attack and safeguard your environment against the evolving threats that are likely to come.

    • Phil Richards, CISO
    • Chris Goettl, Manager of Product Management, Security

    About Phil Richards:
    Phil Richards is the Chief Information Security Officer (CISO) for Ivanti. He has held other senior security positions including the head of operational security for Varian Medical Systems, Chief Security Officer for Fundtech Corporation and Business Security Director for Fidelity Investments.
  • Proactive Security: Building A Successful Threat Hunting Program Recorded: Nov 10 2016 43 mins
    Carl Manion, Managing Principal @ Raytheon Foreground Security
    Understanding the key components necessary to build a successful threat hunting program starts with visibility, the appropriate tools and automation. Skilled, experienced analysts, engineers and incident responders with analytical minds who can apply concepts and approaches to a variety of different toolsets are also instrumental to the process. Join Raytheon Foreground Security as we describe and discuss some of the most common challenges, recommended best practices, and focus areas for achieving an effective threat hunting capability based on lessons learned over the past 15 years.
  • Your Life Is The Attack Surface: The Risks of IoT in 2016 Recorded: Oct 12 2016 35 mins
    Jason Haddix, Head of Trust and Security at Bugcrowd
    The unprecedented growth and adoption of connected devices has created innumerable new threats for organizations, manufacturers and consumers, while at the same time creating unprecedented opportunities for hackers.

    In this webcast, join well known hacker and bug hunting advocate Jason Haddix, as he analyzes the evolution of IoT security and the mistakes and developments that have led us to where we are today. With experience working to attack and defend IoT applications, Haddix will explore what it takes to effectively hack connected devices, and how the role of defenders has evolved in this space.
  • Smartphone Encryption Is Getting Stronger. Is It Enough To Keep You Safe? Recorded: Oct 6 2016 43 mins
    Heather Mahalik, Principal Forensic Scientist at ManTech CARD
    As smartphones become more secure, what has changed for us forensically? What are the different types of security measures being deployed and how do these affect our processes? Which acquisition methods are best for secured devices? If you get an image of the device, can your current forensic methods provide you access for analysis? And most of all, will these security mechanisms keep your private data safe?

    This presentation will go into detail on each of these topics and dive into ways around some of these security features on smartphones. White papers, tools (including open source) and methods written and developed by those in our community will be discussed. Don't let a smartphone "out smart" you - take the reigns of your investigation.
  • Data Theft in the 21st Century: Detect and Block PII & PEI Theft Recorded: Sep 8 2016 49 mins
    Jay Beale, COO at InGuardians
    Cybersecurity expert Jay Beale will provide a State of the Industry look into theft and exposure of huge data sets of PII (personally identifiable information) and PEI (personally embarrassing and exposing information).

    Join this presentation and learn about the recent thefts and the methods of detecting and blocking them.
  • Shut the Traps: Take the Win out of Recon for an Attacker Recorded: Sep 7 2016 44 mins
    Alissa Torres, Senior Security Consultant at Sibertor Forensics
    By the time sophisticated cyber criminals gain access to your network, they may already possess incredible insight into the culture, infrastructure, security and day-to-day operations of your company. How are they able to obtain such information? Reconnaissance is the FIRST stage in remote exploitation performed in a targeted attack and can take place over a period of days, weeks or even years prior to the attacker ever delivering his first phishing email. Just what sensitive information has your company, your employees, your vendors or your customers made publicly available, either knowingly or inadvertently? Though a tweet or social media post may be harmless on its own, in aggregate, a company may suffer a weakened security posture if details such as key individuals, sensitive projects, financial projections and internal politics are disclosed in a public forum.This talk will focus on ways you can access and reduce your online disclosures. Take the "win" out of reconnaissance for the attacker by cutting off his pre-attack intelligence sources.
  • DevOps, Security and PCI - Implementing SCM To Meet PCI Standards Recorded: Sep 7 2016 49 mins
    Kevin Eberman, Director of Operations at MineralTree
    Security failures with millions of stolen credit cards have become an all too normal part of the news. The Payment Card Industry (PCI) has issued a standard for companies and service providers for handling credit cards to mitigate the risk of these breaches. Implementing a PCI certified environment requires a coordinated and sustained commitment to security by adopting policies, writing procedures, and an ability to successfully demonstrate compliance during audits.

    A number of PCI standards require the implementation of Server Configuration Management (SCM). SCM is an integral tool of DevOps. It is invaluable for meeting PCI requirements that are technical and need documentation. This discussion will review security challenges, which PCI requirements can be met with SCM and how to successfully implement SCM to meet PCI standards.
  • “If I Wake Evil” - How I Would Attack You If I Turned into a Criminal Mastermind Recorded: Sep 7 2016 47 mins
    John Strand, Owner of Black Hills Information Security
    What if I no longer was a white hat? What if I started to hack for fun and profit at other expense?
    How would I do it? Could you catch me? How can you stop me?

    Join this presentation and get a unique insight into the mind of the hackers trying to get into your systems and steal your information. Learn how it can be done, and what are the precautions and preventive measures you can take now to make sure your company is prepared for attack.
  • Mapping the CYBERscape: Advanced Threat Detection within the Security Ecosystem Recorded: Sep 6 2016 64 mins
    Eric McAlpine, Founder & Managing Partner at Momentum Partners and Luis Maldonado, VP of Products at Sqrrl
    Learn about the current state of the cybersecurity landscape and how various solutions, like threat hunting platforms, fit into an effective security ecosystem.

    In this webinar you will learn:
    - The current state of the cybersecurity market
    - What is the CYBERscape: a useful tool to make sense of an increasingly complex cybersecurity ecosystem
    - A breakdown of the advanced threat detection vendor category and how it continues to evolve
    - Solutions to leverage to complement your existing security ecosystem
  • Using Automation & Orchestration to Strengthen Network Security & Fight Hackers Recorded: Sep 6 2016 49 mins
    Sourabh Satish, Co-Founder & CTO at Phantom Cyber
    Limited resources, increased threat surface and incidents, and the overwhelming complexity of technology infrastructures, have made securing the organization more challenging than ever. Learn how security automation and orchestration is helping to address advanced threats, new vulnerabilities, hackers, zero day attacks, vulnerable apps and all the other elements that threaten your organization's network.
  • From Passive to Aggressive: Taking a Surgical Approach to Security Operations Recorded: Sep 6 2016 22 mins
    Rebekah Wilke, V-SOC Manager at Raytheon Foreground Security
    For too long, the conventional approach to information security has been to plant people at consoles and have them passively wait for an alarm. When an alert goes off, they are supposed to react and stop the attack. Whether this is done internally or through a managed security provider, the end result is the same – a passive approach to security. Enter V-SOC. A proactive, intelligence-driven and customized approach, specializing in innovations encompassing all flavors of customer engagements and service delivery. Join this presentations and learn:
    - How to be proactive in your approach to security operations
    - How to engage with an MSSP
    - Why you must automate wherever possible
  • Using Endpoints to Accelerate Threat Detection, Protection and Response Recorded: Aug 10 2016 45 mins
    Simon Crosby, CTO at Bromium
    Distributed, automated detection and protection accelerates breach response.

    Sadly more than 90% of breaches start with a “click”: Attachments, downloads, malvertising, Java, the web, media, USB and executables all punch holes in the perimeter. Conventional “detect to protect” tools fail – because 99% of malware morphs in under a minute, making signatures useless. And the thousand-fold increase in crypto-malware signals a shift to machine-timescale breaches that can bring an organization to its knees before the first alert. CISOs find themselves in the awful position of having to detect a breach once an attacker has succeeded – without knowing what to look for or how to respond.

    In an era of targeted and machine-timescale attacks, luck and hope are not enough. This talk will present a way to use the endpoints themselves to accelerate enterprise detection, threat analysis and response. The approach relies on the use of virtualization based security on endpoints to isolate threat vectors, protecting the endpoint but more importantly providing an isolated environment in which malware will execute, with the advantage of tamper-proof monitoring. Insights from each endpoint are correlated to accelerate enterprise-wide response.
Protect, Detect & Respond
Discover the latest trends in cyberattacks, threats and vulnerability risks, as well as the tools and techniques threat hunters use to protect, detect, and respond to attacks.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Data Theft in the 21st Century: Detect and Block PII & PEI Theft
  • Live at: Sep 8 2016 6:00 pm
  • Presented by: Jay Beale, COO at InGuardians
  • From:
Your email has been sent.
or close